• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 50
  • 50
  • 23
  • 18
  • 14
  • 12
  • 12
  • 10
  • 9
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Addressing the Climate Change in Europe: A Security Threat, or a Risk? : A Qualitative Content Analysis upon the European Commission's Addressing of the Climate Change

Demirel, Özge January 2023 (has links)
Climate change not only corresponds to scientifically proven future implications, but also poses a politically relevant study of climate security analysis, affecting the study and practice of (international) politics in different ways. In the same vein, the EU as an international organization have been getting more involved in discussions of climate-related security risks, in which the European Commission (which represents the Union’s common interests) have been publishing a set of consecutive policy documents addressing the climate change since the early 2000’s. Accordingly, this thesis studies five big policy documents produced by the Commission addressing the climate change between 2007 and 2021 by conducting a Qualitative Content Analysis upon the discourses and conceptualizations used to inform how the issue is to be understood, while basing on the theoretical model developed by von Lucke  et al.’s (2014) that distinguishes levels of referent objects and risk-security approaches. In doing so, it finds that the Commission often draws indirect connections between the climate change and its social, political and economic implications to the EU at the territorial (and individual) level, while heavily employing risk-based approaches and promoting rather business-as-usual solutions.
22

A security risk management approach to the prevention of theft of platinum group metals: case study of Impala Platinum Mines and Refinery

Mokhuane, Seadimo Joseph 02 1900 (has links)
Text in English / The purpose of this study was to establish the vulnerabilities of the security control measures that are being used at Impala Platinum mines and refinery to prevent the theft of Platinum Group Metals (PGMs). It is important to ensure that the security control measures in place are effective and efficient in preventing the occurrence of such theft. The research examined the security risk management approach to the prevention of theft of PGMs and the causes of theft of PGMs by organised crime syndicates operating in South Africa and abroad. The study found that Impala Platinum employees, in collusion with contractors and members of mine security services, are involved in the theft of PGMs. To achieve the goals and objective of the research study, effective security control measures were identified that will help Impala Platinum mines and refinery to overcome the risks and challenges related to the theft of PGMs. / Security Risk Management / M. Tech. (Security Management)
23

An analysis of security measures implemented on commercial private game reserves in Limpopo

Herman, Dewald Gustav 29 November 2020 (has links)
South Africa presently experiences high levels of crime daily. Although crime is accepted as an everyday occurrence for its citizens, it affects the economy of the country. This study analysed security measures implemented on Commercial Private Game Reserves (CPGRs) in Limpopo and the impact of crime thereof. CPGRs are enclosed areas containing various species of fauna and flora. Visitors from domestic and foreign origins visit these reserves to enjoy nature and its tranquillity. This study analysed the security measures to determine their effectiveness for CPGRs. The study further explored the use of security risk management strategies and risk assessments as crime reduction tools. The study was carried out using a case study research design. Data were collected by the researcher using three methods: observation, onsite checklists and semi-structured one-on-one interviews which were conducted on site. Validity and reliability indicate the trustworthiness of the study. The researcher reduced the data gathered through the use of thematic data analysis. Interviews were transcribed and themes were created and identified by the researcher. The comprehensive data indicated the importance of a security risk manager on a CPGR. The research found that very few security risk managers are employed and that managers of security risks employed on CPGRs have various titles. However, while the CPGRs have similar risks, their risk reduction strategies vary. The most commonly used measures are people, physical and technological measures with each having various subdivisions. The security measures implemented by CPGRs in the Limpopo province which were analysed are not formulated using a scientific approach as most properties do not make use of a formal security risk assessment. The study is deemed valuable as a model was developed from the findings that could be used by game reserves to guide them to apply relevant security measures. A formal security programme is often limited due to financial constraints of the reserve or the reserve owners, however, not all strategies should be considered as a financial expense as much can be done without exhausting financial reserves. The findings contributed to making recommendations to improve the overall security of CPGRs. This study encourages more research into the subject to improve the security industry and to stimulate the tourism industry. / Security Risk Management / M. Tech. (Security Management)
24

Risk management in liquefied natural gas ports and marine terminals supply chains

Briouig, Mohamed January 2014 (has links)
Due to its environmental attributes, Liquefied Natural Gas (LNG) as a clean fossil fuel source of energy has witnessed a steady increase in demand worldwide over the last decade. This increase is mainly attributed to higher demand from the power generation sector as well as from domestic and industrial usages .This growing role of LNG among competing energy sources has raised concerns over the safety and security of the LNG chain of production, transport and distribution and its related infrastructure. Within this context, LNG ports and marine terminals, being strategically located at the midstream of the LNG Supply Chain (SC), are further exposed to safety and security risks and represent credible targets for international terrorism. Ensuring uninterrupted, robust and resilient LNG SC requires first, adequate management of safety and security risks in LNG ports and marine terminals. While each discipline of risk, be it safety or security, has received significant attention both in theory and practice, less attention was given to the management of interfaces and shared impacts among LNG Ports safety and security risks which led to the existence of gaps in the risk management (RM) systems of LNG ports and may represent a major source of risk and disruption to LNG ports. This research addresses such gaps which are poorly addressed in the current literature and proposes a holistic and integrated approach to the issues of LNG ports safety and security risks assessment and management. It also aims to model safety and security RM from a SC perspective and examines the relationships and shared impacts among LNG ports safety and security risks in the present context of increased LNG demand worldwide in the post 9/11 terrorism era. A unique combination of multiple methods within port and maritime SCs, including a Delphi survey, quantitative survey, Soft Systems Methodology (SSM) and a focus group expert consultation, is applied to reformulate the prevailing RM approach marked by dichotomy and a disciplinary silo and to propose a more enhanced and holistic approach to safety and security RM. The results of the study confirm that an integrated and holistic approach to the issue of RM in LNG ports and marine terminals is necessary to cost-effectively address safety and security risks and ensure reliable and resilient LNG SCs. Furthermore, a practical framework, in the form of a conceptual model, for LNG ports risks and emergencies management is proposed which integrates all facets of safety and security risks and emergencies management, including risk prevention, mitigation, emergency planning and response and port business continuity. The proposed conceptual model shows how the proposed RM approach can be practically applied in the context of LNG ports in the Middle East and North Africa (MENA) region, as well as in any LNG port worldwide which lacks an integrated approach to risks and emergencies management.
25

Understanding Financial Value of Cloud-Based Business Applications: A Phenomenological Study

Arthur, Victor Arthur 01 January 2017 (has links)
An understanding of opportunities and challenges in cloud computing is needed to better manage technology costs and create financial value. The purposes of this transcendental phenomenological study were to understand the lived experiences of minority business owners who operated business applications in the cloud and to explore how these experiences created financial value for businesses despite security challenges. Historically, minority business owners have experienced high rates of business failures and could benefit from information to help them manage business costs in order to position their businesses to grow and succeed. Modigliani-Miller's theorem on capital structure and Brealey and Young's concept of financial leverage were the conceptual frameworks that grounded this study. Data consisted of observational field notes and 15 individual semistructured interviews with open-ended questions. I used the in vivo and pattern coding approaches to analyze the data for emerging themes that addressed the research questions. The findings were that drivers of positive cloud-based experiences, such as easy access, ease of use, flexibility, and timesavings, created financial value for small business owners. In addition, the findings confirmed that opportunities in the cloud such as cost savings, efficiency, and ease of collaboration outweighed security challenges. Finally, the results indicated that cost-effective approaches such as the subscription model for acquiring technology created financial value for businesses. The findings of this study can be used by business owners, especially minority small business owners, to decide whether to move operations to the cloud to create financial value for their businesses.
26

Prevalência e fatores associados à insegurança alimentar e nutricional / Prevalence and factors associated with food and nutrition insecurity

Costa, Narithania de Souza 22 March 2016 (has links)
The proper alimentation is one of the basic human rights, which is indispensable for the ensuring all other rights and the full exercise of citizenship, covering aspects that are not limited only the access to food, but also to the context in which are inserted individuals and communities. The difficulty of regular and permanent access to food by a significant part of the population determines to food insecurity and nutrition (INSEC), complex and multidimensional phenomenon that develops as a continuous and differentiated process in stages, ranging from concerns of to lack food, to qualitative changes in feed and hunger itself. In order to contribute to of discussion this problematic, was held this dissertation, which is composed of a chapter of literature review and an original article, which aimed to determine the prevalence and factors associated with food insecurity (FI) in Alagoas during the recent economic crisis through which passes the country. It is a cross-sectional study with a probabilistic sample of 3.366 families. The FI was identified based on the Brazilian Food Insecurity Scale. The associations with independent variables in the crude analysis obtained p <0.2 (chi-square), were subjected to multivariate analysis. The prevalence of FI was 58.3% (33.1%, 17.9% and 7.3% for mild, moderate and severe forms, respectively), considerably higher than the 34.6% found by IBGE before (2013) the worsening of the current economic crisis. Factors independently associated with IA were head of household is female, head of household does not have income, women overweight, number of family members ≥ 4, family income ≤ 1 minimum wage, family be economy class D-E, be user of government program, domicile not be masonry, does not reside in own home and the amount of room in the house ≤ 4. The prevalence of FI exceeded that found in a survey conducted before the current brazilian economic crisis and, out overweight women, all associated factors are related to the largest family of socially vulnerable, demonstrating the need to strengthen the maintenance and strengthening of public policies aimed at ensuring food and nutrition security. / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A alimentação adequada constitui um dos direitos humanos básicos, o qual torna-se indispensável para a garantia de todos os outros direitos e ao pleno exercício da cidadania, abrangendo aspectos que não se limitam apenas ao acesso aos alimentos, mas também ao próprio contexto em que os indivíduos e as comunidades estão inseridas. A dificuldade de acesso regular e permanente aos alimentos por uma parte relevante da população determina uma situação de insegurança alimentar e nutricional (INSAN), fenômeno complexo e multidimensional que se desenvolve como um processo contínuo e diferenciado em etapas, que vão desde a preocupação de que venha faltar comida para a família, até mudanças qualitativas na alimentação e a fome propriamente dita. Visando contribuir com a discussão dessa problemática, realizou-se a presente dissertação, a qual está constituída de um capítulo de revisão da literatura e um artigo original, que teve por objetivo verificar a prevalência e os fatores associados à Insegurança Alimentar (IA) em Alagoas por ocasião da recente crise econômica pela qual passa o País. Trata-se de um estudo transversal com amostra probabilística de 3.366 famílias. A IA foi identificada com base na Escala Brasileira de Insegurança Alimentar. As associações com as variáveis independentes que na análise bruta obtiveram p<0,2 (qui-quadrado), foram submetidas à análise multivariável. A prevalência de IA foi de 58,3% (33,1%, 17,9% e 7,3% para as formas leve, moderada e grave, respectivamente), valor consideravelmente superior aos 34,6% encontrados pelo IBGE antes (2013) do agravamento da atual crise econômica. Os fatores independentemente associados à IA foram: chefe da família ser do sexo feminino, chefe não possuir renda, mulher com excesso de peso, número de pessoas da família ≥ 4, renda familiar ≤ 1 salário mínimo, família ser da classe econômica DE, ser usuária de programa do governo, domicílio não ser de alvenaria, não residir em casa própria e a quantidade de cômodos da casa ≤ 4. A prevalência de IA superou a encontrada em pesquisa realizada antes da atual crise econômica brasileira e, fora o excesso de peso nas mulheres, todos os fatores associados estão relacionados à maior vulnerabilidade social da família, demonstrando a necessidade de reforçar a manutenção e fortalecimento das políticas públicas voltadas a garantia da Segurança Alimentar e Nutricional.
27

Vliv legální a nelegální migrace na vnitřní bezpečnost České republiky a krizové řízení / The Influence of Both Legal and Illegal Migration on the Internal Security of the Czech Republic and the Crisis Management

HAVEL, David January 2010 (has links)
The issue associated with the migration of foreigners, with the positive and negative aspects that inevitably bring, is a phenomenon that can not be left unnoticed by the authorities, regardless of whether they are migrants residing at the territory of the Czech Republic legally or illegally. Especially nowadays, when most countries are in the global economic crisis, it is the issue that deserves proper attention (with due regard for the possible impacts on the internal security of the Czech Republic, the economy, the social sphere and the citizens´ behaviour). The Czech Republic is aware of the risks associated with the high flow of immigrants. As a proof of that is, that this area has been evaluated as one of the possible non-military threats (or crisis situations) and as such it was defined in the crisis planning as a part of the Plan called {\clq},The Migration Wave of a Large Extent`` drawn by the National Security Council. This work on the topic of The Influence of Both Legal and Illegal Migration on the Internal Security of the Czech Republic and the Crisis Management contains an interpretation of the basic concepts and the development trends in the field of migration in the theoretical part and it also defines the authorities resposinble for solving of the individual issues related to the migration of foreigners. The practical part contains a situational analysis of the presence of foreigners in the South-Bohemian Region compared with the Czech Republic and also the rate of criminal activities committed by foreigners also compared with the Czech Republic as a whole. The research was conducted between the years of 2003 and 2009.
28

How companies manage IT security : A comparative study of Pakistan and Sweden

Qureshi, Mustafa Ali, Khalid, Farhan January 2013 (has links)
IT security provides comprehensive picture both internally and externally by act of ensuring that data is not lost when critical issues arise. In spite of the world has now been replaced with an imperative approach. The companies are using widely desktop computers, laptops, ipads, smart phones and workstation. The sum of all this has been influence to the IT based information and communication system in companies.   The purpose is to do research by taking a critical look at how different kind of business and non-business companies manage their IT security in Pakistan and Sweden with specific emphasis on the administrative controls. As the IT security has a list of steps but the authors focused on three major functions: IT security policy, IT security plan and IT security risk analysis.   As soon as the topic was selected the emphasis was laid on collecting and reading material related to the IT security. It became clear that the most relevant and interesting task was not merely to investigate how different companies in Pakistan and Sweden manage their IT security but infact try to understand what kind of steps and measures lies behind to achieve them. The method was adopted qualitative because it fulfil the requirements which authors want to achieve in the form of deeper understanding how different companies manage IT security in two different countries.   This study concluded that Pakistani companies in terms of IT security policy should focus on data ware houses by implementing policies for securing of exploiting the data and in case of Swedish company IT managers should implement policies for securing of personal data. Evaluation techniques are missing from the companies of Pakistan and Sweden in IT security plan. Enhancing the performing of IT risk analysis to countermeasure the threat. Pakistani companies should focus on business model of information asset. In case of Swedish company higher level and more detailed analysis can apply to core areas of the IT system. These proposed points for improvements could also help in more understanding of IT security in Pakistan and Sweden.
29

um modelo conceitual para especificação da gestão de riscos de segurança em sistemas de informação / A conceitual model for specification for security risk management of information systems

Kroll, Josiane 12 March 2010 (has links)
Conselho Nacional de Desenvolvimento Científico e Tecnológico / The lack of an alignment among concepts that involve security risk management has caused the stalemate in the adoption of security risks management models for organizations. There are several standards and risk management methodologies, having a large set of concepts, defined in many ways. In order to get an alignment of concepts and establish a suitable vocabulary for risk management, the conceptual modeling was used within the realm of security risks management. By using the conceptual modeling it was possible to abstract concepts and obtain a conceitual model for the specification of security risks management, called GRiSSI - Gestão de Riscos de Segurança de Sistemas de Informação (Information Systems Security Risk Management). Some metrics were also proposed for the identified concepts in the conceitual model, to make further improvements and corrections in security processes. The proposed conceitual model was validated through the application audits and metrics for UML models. / A falta de alinhamento entre os conceitos que envolvem a gestão de riscos de segurança tem causado um impasse na adoção de modelos de gestão de riscos de segurança pelas organizações. Há diversas normas e metodologias de gestão de riscos e de segurança que possuem uma série de conceitos e são definidos de várias maneiras. Para obter o alinhamento desses conceitos e estabelecer um vocabulário próprio para a gestão de riscos, este trabalho utilizou a modelagem conceitual para o domínio da gestão de riscos de segurança. Com a modelagem conceitual foi possível abstrair esses conceitos e obter um modelo conceitual para a especificação da gestão de riscos de segurança, chamado GRiSSI (Gestão de Riscos de Segurança de Sistemas de Informação). Algumas métricas também foram propostas para os conceitos identificados no modelo conceitual, com o intuito de contribuir para promover melhorias e efetuar correções em processos de segurança. O modelo conceitual proposto foi validado por meio da verificação feita como a aplicação de auditorias e métricas para modelos UML.
30

Internet of Things based Smart Homes : Security Risk Assessment and Recommendations

Ali, Bako January 2016 (has links)
The Internet of Things (IoT) is an emerging paradigm focusing on the inter-connection of things or devices to each other and to the users. Over time, the most of connections in IoT are shifting from ‘Human to Thing’ to ‘Thing to Thing’. This technology is anticipated to become an essential milestone in the development of smart homes to bring convenience and efficiency into our lives and our homes. But, by bringing this IoT technology into our homes there will be important implications for security in these technologies. Connecting every smart objects inside the home to the internet and to each other results in new security and privacy problems, e.g., confidentiality, authenticity, and integrity of data sensed and exchanged by objects. These technologies are very much vulnerable to different security attacks that make an IoT-based smart home unsecure to live in and therefore it is necessary to evaluate the security risks to judge the situation of the smart homes. For any technology to be successful and achieve widespread use, it needs to gain the trust of users by providing sufficient security and privacy assurance. As in all sectors, maintaining security will be a critical challenge to overcome. As homes are increasingly computerized and filled with devices, potential computer security attacks and their impact on residents need to be investigated. This report uses OCTAVE Allegro Methodology which focuses mainly on information assets and considers containers (technical, physical and people) and conducts a security risk assessment with the goal of highlighting various security flaws in IoT-based smart home, impacts and proposing countermeasures to the identified issues satisfying most of security requirements. Finally, it comes up with some recommendations to the users. The research findings documented into a thesis paper for secure IoT-based smart home systems and the resulted list and recommendations will be some useful contribution which can be used as a foundation for the specification of security requirements. For future work, the assessment will be extended to include more types of smart home applications rather than just typical one. / <p>Validerat; 20160620 (global_studentproject_submitter)</p>

Page generated in 0.0534 seconds